New Home Security Challenges Come with the Territory...

And for good reason. The technology we depend upon to an ever increasing degree is often a two edge sword. Most of us have no clue how much of this stuff works. It's too "techy" for us. And that leaves a wide open door to those who do know and can take advantage of the Open Door these new technologies can provide.

The first Irony of the topic is the simple fact that...​

Americans want to be safer online – but not if they have to do anythingIn the wake of non-stop news about identity theft, malware, ransomware, and all manner of information security catastrophes, Americans have educated themselves and are fully leveraging today’s powerful technologies to keep themselves safe… not.

While 67% told Morar Consulting they “would like extra layers of privacy,” far fewer use the technological tools now available to them. That’s the top-line finding of a brand-new survey of 2,000 consumers by Morar on behalf of the worldwide VPN provider “Hide My Ass!”

A key related finding: 63% of survey respondents have encountered online security issues. But, among the folks who’ve been bitten, just 56% have permanently changed their online behavior afterwards. (If you don’t learn the “hard way,” when do you learn?)

According to Morar, there’s still an odd disconnect between the way some people protect themselves offline and what they’re willing to do on the web. 51% of respondents would publicly post their email addresses, 26% their home addresses, and 21% their personal phone numbers.Read More...

Today's home is increasingly vulnerable as more and more internet enabled devices come into them...

... Most consumers do not see these devices as risky, but the truth is, items such as Internet-connected baby monitors, Wi-Fi connected toys, cars with infotainment systems and medical supplies can all be hacked.

For instance, there was an issue recently that allowed hackers to get into the infotainment system of Jeep Cherokees, and through that, could remotely turn on wiper blades, air conditioning and raise the radio volume. There was later a patch released to defeat this hack.One notable hacking incident having to do with toys comes with the Hello Barbie. This toy is Wi-Fi enabled and has a microphone that records children, and then responds. However, through this, it is easy for hackers to use the toy as a potential eavesdropping device and access account access.

While there are risks with the new technologies, they also offer the potential of significant added security. Take for example Home Security Door Sensors.

There are a number of ways to use a door sensor in your home. Here are a couple of options:

Child protection – If you have curious kids who like to get into the pool supplies, garages or other areas that may be dangerous, install an entry sensor and get an instant alert whenever the gate or door is opened.

Open door notification – A door sensor often doubles as a doorbell, and if the system is off, it sounds like a chime when someone triggers the sensor.

Keep out alert – You can also use your entry sensor as an alert in areas that are off limits, such as the game room or liquor cabinet. This is a good reason to use a silent alert, which will allow you to crack down on any rule-breaking.

Protecting Stuff Outside – An entry sensor can also be used outside to protect your outdoor equipment. Do you have a shed with all kinds of tools inside?

​Gun cabinet – An extra layer of protection to your locked cabinet is a sensor on the inside alerting you to an unlocked cabinet. This can be a true life saver in the event you forget to lock it and the kids, or anyone else gets unauthorized access.

This is Why People Fear the ‘Internet of Things’

Imagine buying an internet-enabled surveillance camera, network attached storage device, or home automation gizmo, only to find that it secretly and constantly phones home to a vast peer-to-peer (P2P) network run by the Chinese manufacturer of the hardware. Now imagine that the geek gear you bought doesn’t actually let you block this P2P communication without some serious networking expertise or hardware surgery that few users would attempt.

The FI9286P, a Foscam camera that includes P2P communication by default.

This is the nightmare “Internet of Things” (IoT) scenario for any system administrator: The IP cameras that you bought to secure your physical space suddenly turn into a vast cloud network designed to share your pictures and videos far and wide. The best part? It’s all plug-and-play, no configuration necessary!

I first became aware of this bizarre experiment in how not to do IoT last week when a readersent a link to a lengthy discussion thread on the support forum for Foscam, a Chinese firm that makes and sells security cameras. The thread was started by a Foscam user who noticed his IP camera was noisily and incessantly calling out to more than a dozen online hosts in almost as many countries.

Home security is a serious topic and one we take seriously at The Connected Home MN. We can help you decide whether and how to combine your Internet Access with a sophisticated home security system in the most economical manner possible.

Comments are closed.

Author

Write something about yourself. No need to be fancy, just an overview.